User Controls

  1. 1
  2. 2
  3. 3

Posts by munheeiskingofchina

  1. Yes I do.

    The server is accessing the internet. The server is then sending the internet to your computer. Your computer is not connected to the internet.
  2. If it's getting routed through a server it is not allowing a direct connection to your computer.
  3. i mean, sex with people, or pure in intention.
  4. do you mean with people?
  5. Do you mean hiding a file in the system?

    Does it need outside access to be effective?

    It gets blocked on the computer and at the cloud.
  6. What does that mean?

    All I know is the internet system is not capable of any exploits beyond stealing your classmates study notes.
  7. I have a problem with jealousy and resentment.

    Being the king of China makes people jealous and resent me.

    therefore my homicidal tendencies at police interference are focused on protecting a multi billion dollar investment,

    To reiterate:

    federal agents make me homicidal
  8. I have a problem with federal agents. They are not legally allowed to approach me.

    I am the king of China. My girlfriend is a colonel in the PLAN. If they approach me they sabotage their careers. And they know approaching me is to feed their egos. Not as a part of their employment.

    And they persecute people and incite civil unrest.

    Police coming near me make me homicidal.
  9. If it was cloud based for the purposes of high security it would only think it was using a SMTP server to send emails so that existing software was compatible. Or new developed software would know it was going straight to the cloud in blocks of data to one access point. And at the cloud it would ONLY allow http through and whatever else there is, like STMP. And that would be sent in a block to your access point. In reality everything would just be uploaded in chunks bypassing common security risks such as dedicated email ports. Like a can of soup. All in one place. One access point. Rather than making soup from all different ingredients from all over the place risking cross contamination (food safety standards 101).
  10. If you were female? Homicidal.

    If you were male? Like my dick was bigger than yours.
  11. Do they still use STMP servers or is it cloud based for increased security?

    If the email ports are being accessed when the email client that is linked to the high security software is not being utilised, it will find the source and kill it.

    There's nothing internet to do.
  12. If you want to discover if the girl you likes has a boyfriend, your trojan will get that secret information without having to ask her.

    Major companies....... firewall. All software has a signed access key.

    defense industries etc...

    They will detect it. And feed the information they want you to have to manipulate you.

    And bitcoin is not secure. The media told you it is secret and undetectable. Therefore, it isn't. It is there to steer anyone with a propensity for secret dealings involving international anything, including crime, terrorism or espionage, towards an area where they are instantly detectable.
  13. How does CIA do things like Arab spring?

    Find oppressed sand niggers/gang bangers. Support them.

    How does CIA prevent civil war in the USA? Find oppressed niggers/gang bangers. Support them.

    Fuck the police.
  14. Personally, if you don't work for DoD you don't have a cool job.

    CIA recruits from DoD for people who don't work at a desk. Because CIA and DoD are friends. DoD has all the capabilities of the CIA in an independent capacity. CIA can have an opinion, just like secret DoD units. Don't like what the government is doing? BAM. Dead Kennedy. Police do what police do. And if they disagree they become a security risk. CIA disagrees and gets a promotion. Because CIA is trusted to use their better judgement. Which is why they don't persecute people and carry handcuffs. They talk to people, don't radicalise people (to give them more work) and realise this isn't a game.

    Pig.
  15. Maybe you work for the FBI and don't know.

    Why did the government make you hate them? Because employees wanted to incite terrorism, illegally persecute you and destroy their careers/go to jail/go on a watch list, or, do you not remember the part where you work for the FBI?

    I'm just speculating. You might work for the DHS for all I know. And just think you are some kind of hobo for your undercover job.

    Pig.
  16. You started this rap battle. In my intro thread.
  17. A trojan is illegal and serves no purpose unless you are trying to secretly obtain information. You can't secretly wire transfer money it leaves a huge trail.

    And if you are after information, your software is more than detectable.
  18. [FONT=Verdana][SIZE=12px]In this dance, women dressed in Hanbok (traditional Korean clothing) join hands in a circle and sing together on a night when the full harvest moon appears or on Chuseok.[/SIZE][/FONT]
    http://english.visitkorea.or.kr/enu/SI/SI_EN_3_6.jsp?cid=811650

    Stargazers in the UK and in many parts of the world have had their smartphones and cameras out for a rare supermoon eclipse, the first of its kind since 1982, and the last we'll see until 2033.
    http://www.telegraph.co.uk/news/11895052/Supermoon-lunar-eclipse-2015-Amazing-pictures-of-once-in-a-generation-event-live.html

  19. Oh and water on mars.
  1. 1
  2. 2
  3. 3
Jump to Top